Mark Albertson
Latest from Mark Albertson
VIDEO EXCLUSIVE
Three insights you might have missed from the Dell ‘Trusted Infrastructure’ event
Enterprises are taking a closer look at securing information technology infrastructure, and it’s proving to be a tall order. The work to secure virtual and bare metal machines, in addition to the software that runs on them, has revealed a catalog of vulnerabilities that outstrip the tools designed to guard against intrusion. This is the ...
Joint NetApp, VMware and AWS solution streamlines cross-platform workload operations
Three powerhouse enterprise tech companies have joined forces to provide customers with flexible, high-performance virtualized storage infrastructure that can be scaled independently from compute. The VMware Cloud on AWS integration with Amazon FSx for NetApp ONTAP solution was unveiled during VMware Explore in late August. The integration of technologies between the three companies is designed ...
DPU solution could change the game for VMware’s network and application security model
VMware Inc. announced an intriguing development on the security front during its recent annual conference. The virtualization pioneer unveiled an enhancement for its NSX network platform that leverages data processing unit acceleration using smart network interface controllers. Behind the technical jargon of VMware’s announcement can be found a simple reality: The DPU has the potential ...
Lightweight agents help CrowdStrike process 7 trillion events per week for customer security
The technology behind CrowdStrike cybersecurity solution relies on lightweight agents or sensors to monitor for threats and collect vital security data. As organizations have learned, some agents can be lighter than others. “Many times when you look at them, they are not lightweight; they take a lot of effort to install, and they need reboots,” ...
VIDEO EXCLUSIVE
Analyst assesses CrowdStrike’s opportunity to consolidate tools and enrich security beyond the endpoint
As the Fal.Con gathering came to a close in Las Vegas this week, the event offered a glimpse into how companies such as CrowdStrike Holdings Inc. are seeking to address pain points in the cybersecurity industry. One of these has been tool fatigue. A ReliaQuest survey of cybersecurity professionals found that enterprises maintain an average ...
CrowdStrike CEO George Kurtz bets on community immunity for breach protection
Should cybersecurity companies offer warranty protection in the event of a breach? Four years ago, CrowdStrike Holdings Inc. decided to do just that. The company announced its endpoint security breach prevention warranty of up to $1 million in 2018 if a breach occurred for a customer within the protected environment. As of this summer, the ...
VIDEO EXCLUSIVE
Observability and expanded ecosystem capture analysts’ attention at CrowdStrike’s Fal.Con
CrowdStrike Holdings Inc. has built its reputation in providing cloud-delivered protection of endpoints, workloads, identity and data through the use of lightweight agents or sensors in a network. This week, the company unveiled new products to drive the convergence of security and observability with a centralized log management strategy based on technology acquired through the ...
Salesforce embraces the ‘Great Reunion’ with technology for personalized data and collaboration
Salesforce Inc. kicked off its Dreamforce conference this week by bringing 40,000 members of its extensive community together in San Francisco for the first time in more than two years and unveiling new offerings to allow them to connect with each other in new ways long after the event concludes Thursday. The Dreamforce event, built ...
Rising cost of cybercrime helps fuel Dell Technologies’ vision for trusted infrastructure
At an event organized by the American Enterprise Institute in 2012, U.S. Army General Keith Alexander, director of the National Security Agency at the time, called cybercrime “the greatest transfer of wealth in history.” That was 10 years ago, and the cost of doing business has risen considerably since then. One FBI report pegged the ...
What to expect during the Dell ‘A Blueprint for Trusted Infrastructure’ event: Join theCUBE Sept. 20
In the continued evolution of the cybersecurity landscape, there is trust and there is zero-trust. Both need to be carefully integrated into compute infrastructure to ensure data protection and cyber resilience. Zero trust dictates that users inside or outside an organization must be authenticated before system access is granted. This has become a key element in ...









